×

System and method for identifying exploitable weak points in a network

  • US 9,860,265 B2
  • Filed: 04/17/2015
  • Issued: 01/02/2018
  • Est. Priority Date: 06/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system for predicting attack paths in a network, comprising:

  • one or more scanners configured to determine one or more network addresses and one or more open ports associated with one or more connections in the network; and

    one or more hardware processors coupled to the one or more scanners, wherein the one or more hardware processors are configured to;

    identify, in the network, at least one host that has an exploitable vulnerability based on the one or more network addresses and the one or more open ports associated with the one or more network connections;

    model one or more trust relationships accepted at the at least one host based on the one or more network addresses and the one or more open ports associated with the one or more network connections, wherein the one or more trust relationships accepted at the at least one host provide an available access control path to the exploitable vulnerability on the at least one host;

    simulate an attack against the at least one host, the simulated attack used to determine one or more network addresses that could use the one or more trust relationships accepted at the at least one host to reach the exploitable vulnerability on the at least one host; and

    determine that the one or more network addresses could be used to compromise the at least one host based at least in part on the one or more network addresses corresponding to one or more remote clients that have one or more exploitable weak points.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×